{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:16:17Z","timestamp":1761707777264,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icon.2004.1409210","type":"proceedings-article","created":{"date-parts":[[2005,4,12]],"date-time":"2005-04-12T10:25:58Z","timestamp":1113301558000},"page":"470-474","source":"Crossref","is-referenced-by-count":55,"title":["An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls"],"prefix":"10.1109","volume":"2","author":[{"given":"X.A.","family":"Hoang","sequence":"first","affiliation":[]},{"given":"J.","family":"Hu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"2","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","article-title":"Intrusion detection using sequences of system calls","volume":"6","author":"forrest","year":"1998","journal-title":"Journal of Computer Security"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/89.725320"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/5.18626"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2003.1266245"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1049\/el:20020467"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382914"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2002.1048264"},{"key":"8","article-title":"A tutorial on hidden markov models","author":"dugad","year":"1996","journal-title":"Technical Report SPANN-96 1"},{"journal-title":"The General Hidden Markov Model Library (GHMM) Web Page","year":"0","key":"11"},{"journal-title":"University of New Mexico's Computer Immune Systems Project Web Page","year":"0","key":"12"}],"event":{"name":"2004 12th IEEE International Conference on Networks (ICON 2004)","acronym":"ICON-04","location":"Singapore"},"container-title":["Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9669\/30552\/01409210.pdf?arnumber=1409210","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,11]],"date-time":"2019-02-11T09:06:48Z","timestamp":1549876008000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1409210\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icon.2004.1409210","relation":{},"subject":[]}}